2019/2020 Competency-Based Task/Competency List for Cybersecurity in Food and Agriculture (8074/36 weeks)
Tasks/competencies when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.are considered optional
Demonstrating Personal Qualities and Abilities
Demonstrating Interpersonal Skills
Demonstrating Professional Competencies
- Demonstrate big-picture thinking.
- Demonstrate career- and life-management skills.
- Demonstrate continuous learning and adaptability.
- Manage time and resources.
- Demonstrate information-literacy skills.
- Demonstrate an understanding of information security.
- Maintain working knowledge of current information-technology (IT) systems.
- Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
- Apply mathematical skills to job-specific tasks.
- Demonstrate professionalism.
- Demonstrate reading and writing skills.
- Demonstrate workplace safety.
Examining All Aspects of an Industry
- Examine aspects of planning within an industry/organization.
- Examine aspects of management within an industry/organization.
- Examine aspects of financial responsibility within an industry/organization.
- Examine technical and production skills required of workers within an industry/organization.
- Examine principles of technology that underlie an industry/organization.
- Examine labor issues related to an industry/organization.
- Examine community issues related to an industry/organization.
- Examine health, safety, and environmental issues related to an industry/organization.
Addressing Elements of Student Life
- Identify the purposes and goals of the student organization.
- Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
- Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
- Identify Internet safety issues and procedures for complying with acceptable use standards.
Exploring Work-Based Learning
Note: Competencies 39-43 have been added to ensure compliance with federal legislation: National FFA Organization's Federal Charter Amendments Act (Public Law 116-7, https://www.congress.gov/116/plaws/publ7/PLAW-116publ7.pdf). All inquiries may be sent to email@example.com. Students are provided opportunities for leadership, personal growth, and career success. Instruction is delivered through three major components: classroom/lab instruction, supervised agricultural experience (SAE) program, and student leadership (FFA).
Exploring Leadership Opportunities through FFA
Understanding Cybersecurity in Food and Agriculture
- Identify the Department of Homeland Security's (DHS) 16 critical infrastructure sectors.
- Analyze the interdependence among the commercial facilities, financial services, and food and agriculture (FA) sectors.
- Define asset.
- Define threat.
- Define vulnerability.
- Define risk.
- Compare food defense, food safety, and food security.
- Explain intentional and unintentional food contamination and disruption.
Exploring Cybersecurity Vulnerabilities in Agricultural Production
- Identify cybersecurity vulnerabilities and threats in animal production systems.
- Explain cybersecurity vulnerabilities and threats in animal systems related to health.
- Explain cybersecurity vulnerabilities in animal feed systems.
- Identify cybersecurity vulnerabilities regarding pharmaceuticals.
- Explain cybersecurity vulnerabilities in plant production systems.
Examining Potential Threats and Risks in Food and Agriculture
- Identify cybersecurity threats and risks in water sources.
- Identify cybersecurity threats and risks related to power.
- Identify cybersecurity threats related to chemicals.
- Identify cybersecurity threats related to facilities.
- Identify cybersecurity threats related to equipment.
- Propose methods to ensure equipment (e.g., drones) is resistant to cyberattack.
- Outline the risks associated with fuel supply disruption.
- Explain the steps to identify false information on sensor-based systems.
Examining Precision Agriculture
Exploring Cybersecurity in Agricultural Processing
- Identify facilities that engage in food processing.
- Identify facilities that engage in beverage production.
- Identify animal slaughtering and processing facilities.
- Identify facilities engaged in the manufacture of food and feed for animals.
- Explain how machinery and equipment maintenance plans can reveal cybersecurity intrusion.
- Explain how animal, plant, soil, and/or mechanical test results can reveal cybersecurity intrusion.
- Explain how point source and nonpoint source pollution can endanger food production capabilities.
Investigating Cybersecurity in Agricultural Marketing and Distribution
- Describe types of advertising media used by agricultural businesses.
- Identify wholesale and retail distribution of agricultural and food products.
- Identify agricultural products transportation systems.
- Identify methods of distribution disruption.
- Identify risks in labeling and barcodes.
- Identify risks associated with agricultural food product storage facilities.
- Explain how to create a secure customer relationship management (CRM) database.
Maintaining Cybersecurity in Agricultural Business Management and Financing
- Keep accurate business records.
- Explain how cyber intrusion might affect an agricultural enterprise’s budget.
- Describe management controls used to secure information, operations, and prevent breaches of security.
- Identify financial management tools and strategies related to cybersecurity.
- Identify agricultural applications of leading technology (e.g., GPS, GIS, cellular and wireless communication, software).
- Explain how the creation of records and correspondence, using word processing software, spreadsheets, databases, and email, exposes the creator to cyber threats.
- Back up and restore files.
- Identify methods of preventing importation of computer viruses.
- Explain the basics of financial compliance.
- Explain the effects of identity theft.
- Explain the effects of intellectual property (IP) theft.
- Predict indicators of commodity stock manipulation.
- Research historical precedents of stock/credit manipulation.
- Identify risks of cyberattacks on different producer coalitions.
Identifying Cybersecurity Laws Related to the Food and Agriculture Industry
- Identify national and international cybersecurity laws and policies related to agricultural enterprises.
- Identify regulatory, oversight, and industry organizations in the agriculture and food sectors.
- Explain the Economic Espionage Act.
- Explain the importance of the 2017 Securing our Agriculture and Food Act.
- Identify the costs associated with litigation in cybersecurity cases.
Investigating Future Trends in Agricultural Cybersecurity
Exploring Opportunities for Employment in Cybersecurity
- Research educational requirements for cybersecurity jobs in agriculture.
- Identify careers associated with cybersecurity in agriculture.
- Participate in a work-based learning opportunity related to cybersecurity in an agricultural enterprise.
- Conduct research on cybersecurity in the food and agriculture industries.
- Conduct an oral presentation on a subject related to cybersecurity in the food and agriculture industries, using presentation software.